mirror of
https://github.com/Pathduck/gallery3.git
synced 2026-04-11 08:25:21 -04:00
No longer run a safe HTML string through the HTML purifier (since it's already marked as safe). This also addresses the issue of calling purify() when no purifier is installed. In that case, we'd run clean() on a clean string (double HTML encoding). If this approach doesn't work out, we can still modify the fallback code of purify() to check if the string is already clean before calling clean() instead of purify().
163 lines
4.2 KiB
PHP
163 lines
4.2 KiB
PHP
<?php defined("SYSPATH") or die("No direct script access.");
|
|
/**
|
|
* Gallery - a web based photo album viewer and editor
|
|
* Copyright (C) 2000-2009 Bharat Mediratta
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or (at
|
|
* your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful, but
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA.
|
|
*/
|
|
|
|
/**
|
|
* Safe string representation (regarding security - cross site scripting).
|
|
*/
|
|
class SafeString_Core {
|
|
private $_raw_string;
|
|
protected $_is_safe_html = false;
|
|
|
|
/** Constructor */
|
|
function __construct($string) {
|
|
if ($string instanceof SafeString) {
|
|
$this->_is_safe_html = $string->_is_safe_html;
|
|
$string = $string->unescaped();
|
|
}
|
|
$this->_raw_string = (string) $string;
|
|
}
|
|
|
|
/**
|
|
* Factory method returning a new SafeString instance for the given string.
|
|
*/
|
|
static function of($string) {
|
|
return new SafeString($string);
|
|
}
|
|
|
|
/**
|
|
* Factory method returning a new SafeString instance after HTML purifying
|
|
* the given string.
|
|
*/
|
|
static function purify($string) {
|
|
if ($string instanceof SafeString) {
|
|
if ($string->_is_safe_html) {
|
|
return $string;
|
|
} else {
|
|
$string = $string->unescaped();
|
|
}
|
|
}
|
|
$safe_string = self::of_safe_html(self::_purify_for_html($string));
|
|
return $safe_string;
|
|
}
|
|
|
|
/**
|
|
* Factory method returning a new SafeString instance which won't HTML escape.
|
|
*/
|
|
static function of_safe_html($string) {
|
|
$safe_string = new SafeString($string);
|
|
$safe_string->_is_safe_html = true;
|
|
return $safe_string;
|
|
}
|
|
|
|
/**
|
|
* Safe for use in HTML.
|
|
* @see #for_html()
|
|
*/
|
|
function __toString() {
|
|
if ($this->_is_safe_html) {
|
|
return $this->_raw_string;
|
|
} else {
|
|
return self::_escape_for_html($this->_raw_string);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Safe for use in HTML.
|
|
*
|
|
* Example:<pre>
|
|
* <div><?= $php_var ?>
|
|
* </pre>
|
|
* @return the string escaped for use in HTML.
|
|
*/
|
|
function for_html() {
|
|
return $this;
|
|
}
|
|
|
|
/**
|
|
* Safe for use as JavaScript string.
|
|
*
|
|
* Example:<pre>
|
|
* <script type="text/javascript>"
|
|
* var some_js_var = <?= $php_var->for_js() ?>;
|
|
* </script>
|
|
* </pre>
|
|
* @return the string escaped for use in JavaScript.
|
|
*/
|
|
function for_js() {
|
|
return json_encode((string) $this->_raw_string);
|
|
}
|
|
|
|
/**
|
|
* Safe for use in HTML element attributes.
|
|
*
|
|
* Assumes that the HTML element attribute is already
|
|
* delimited by single or double quotes
|
|
*
|
|
* Example:<pre>
|
|
* <a title="<?= $php_var->for_html_attr() ?>">;
|
|
* </script>
|
|
* </pre>
|
|
* @return the string escaped for use in HTML attributes.
|
|
*/
|
|
function for_html_attr() {
|
|
$string = (string) $this->for_html();
|
|
return strtr($string,
|
|
array("'"=>"'",
|
|
'"'=>'"'));
|
|
}
|
|
|
|
/**
|
|
* Safe for use HTML (purified HTML)
|
|
*
|
|
* Example:<pre>
|
|
* <div><?= $php_var->purified_html() ?>
|
|
* </pre>
|
|
* @return the string escaped for use in HTML.
|
|
*/
|
|
function purified_html() {
|
|
return self::purify($this);
|
|
}
|
|
|
|
/**
|
|
* Returns the raw, unsafe string. Do not use lightly.
|
|
*/
|
|
function unescaped() {
|
|
return $this->_raw_string;
|
|
}
|
|
|
|
/**
|
|
* Escape special HTML chars ("<", ">", "&", etc.) to HTML entities.
|
|
*/
|
|
private static function _escape_for_html($dirty_html) {
|
|
return html::specialchars($dirty_html);
|
|
}
|
|
|
|
/**
|
|
* Purify the string, removing any potentially malicious or unsafe HTML / JavaScript.
|
|
*/
|
|
private static function _purify_for_html($dirty_html) {
|
|
if (method_exists("purifier", "purify")) {
|
|
return purifier::purify($dirty_html);
|
|
} else {
|
|
return self::_escape_for_html($dirty_html);
|
|
}
|
|
}
|
|
}
|